Weekly Show 418: A Real-World Network Design Session

Network design is a popular listener topic. On today’s Weekly Show, we have two guests from the University of Idaho to talk about their current network design, new ideas and initiatives they’re considering, and a conversation/consultation on how to address their challenges.

The University of Idaho has 12,000 students and 3,000 residents across one main campus and 18 small campuses. As many as 30,000 hosts attach to the network.

We dive into current network design issues, including around firewalling and microsegmentation, identity management in the wireless network, and a home-grown network management system.

Our guests are Brian Jemes, Network Manager; and Mike Rusca, Network Engineer, both at the University of Idaho.

Sponsor: ThousandEyes

ThousandEyes gives you performance visibility from every user to every app over any network, both internal and external, so you can migrate to the cloud, troubleshoot faster and deliver exceptional user experiences. Sign up for a free account at thousandeyes.com/packetpushers and choose a free ThousandEyes t-shirt.

Sponsor: ITProTV

Whether you’re just starting out or you’re a seasoned IT professional, ITProTV is the only source you’ll need to learn the skills to pass the most in-demand IT certs — from entry level to advanced — with engaging hosts and a talk-show style format. Visit itpro.tv/packetpushers and use code PACKETPUSHERS to try it FREE for 7 days, and receive 30% off your monthly membership for the lifetime of your active subscription.

Comments

Good podcast. I like the concept. Any chance that in the next going to touch on the addressing front? It’s been a while, but are dorm network drops allocated public address space that is accessible from the Internet?

I’m thinking that micro-segmentation was used where the term segmentation should have been used. Segmentation is using VLANs and allowing policy to be applied at the L3 interface. Micro-segmentation is the capability to segment within a segment, such as within a VLAN. Policy is applied at the host (VM?) or switchport (campus) to apply policy at that level. I have successfully at a previous gig tested preventing hosts from talking to each other on the switchport level using SGT/TrustSec.